pentest ransomware bug security policy DDoS cyber attack encryption security awareness exploit APT Dark Web spyware worm hacker admin CIA triad password IPS social engineering vishing breach SyssecAdmin EDR Defense- in-depth Cyber Security Proofpoint compliance PHI FTP resilience packet IOC firewall incident rootkit risk assessment OS antivirus VPN smishing IP training spam identity theft malware BEC confidentiality insider threat integrity Cyber Defense virus incident response MFA botnet vulnerability PII availability IDS spoofing WISP passphrase zero- day defense evasion business continuity HIPAA escalation phishing IoT Security Operations cryptography network risk pentest ransomware bug security policy DDoS cyber attack encryption security awareness exploit APT Dark Web spyware worm hacker admin CIA triad password IPS social engineering vishing breach SyssecAdmin EDR Defense- in-depth Cyber Security Proofpoint compliance PHI FTP resilience packet IOC firewall incident rootkit risk assessment OS antivirus VPN smishing IP training spam identity theft malware BEC confidentiality insider threat integrity Cyber Defense virus incident response MFA botnet vulnerability PII availability IDS spoofing WISP passphrase zero- day defense evasion business continuity HIPAA escalation phishing IoT Security Operations cryptography network risk
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
pentest
ransomware
bug
security policy
DDoS
cyber attack
encryption
security awareness
exploit
APT
Dark Web
spyware
worm
hacker
admin
CIA triad
password
IPS
social engineering
vishing
breach
SyssecAdmin
EDR
Defense-in-depth
Cyber Security
Proofpoint
compliance
PHI
FTP
resilience
packet
IOC
firewall
incident
rootkit
risk assessment
OS
antivirus
VPN
smishing
IP
training
spam
identity theft
malware
BEC
confidentiality
insider threat
integrity
Cyber Defense
virus
incident response
MFA
botnet
vulnerability
PII
availability
IDS
spoofing
WISP
passphrase
zero-day
defense evasion
business continuity
HIPAA
escalation
phishing
IoT
Security Operations
cryptography
network
risk